Cryptography Reference
In-Depth Information
Kim and Quisquater's countermeasures against second-order fault attacks pro-
posed in [226, 228] were analyzed by Dottax et al. from an implementation stand-
point, revealing a potential vulnerability [125]. Trichina and Korkikyan have also
showed experimental results on the second-order fault attacks on protected CRT-
RSA implementations running on an advanced 32-bit ARM Cortex M3 core [399].
Search WWH ::




Custom Search